cve/2020/CVE-2020-24602.md

21 lines
1.0 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-24602](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24602)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Ignite Realtime Openfire 4.5.1 has a reflected Cross-site scripting vulnerability which allows an attacker to execute arbitrary malicious URL via the vulnerable GET parameter searchName", "searchValue", "searchDescription", "searchDefaultValue","searchPlugin", "searchDescription" and "searchDynamic" in the Server Properties and Security Audit Viewer JSP page
### POC
#### Reference
- https://cybersecurityworks.com/zerodays/cve-2020-24602-ignite-realtime-openfire.html
2024-06-09 00:33:16 +00:00
- https://cybersecurityworks.com/zerodays/cve-2020-24602-ignite-realtime-openfire.html
2024-05-25 21:48:12 +02:00
- https://issues.igniterealtime.org/browse/OF-1963
2024-06-09 00:33:16 +00:00
- https://issues.igniterealtime.org/browse/OF-1963
2024-05-25 21:48:12 +02:00
#### Github
- https://github.com/404notf0und/CVE-Flow